article thumbnail

Third-party risk considerations associated with the Executive Order

Security Boulevard

For providers of technology and business services, like value added resellers (VARs) and managed service providers (MSPs), it’s important to acknowledge a customer’s risk of third-party cyberattacks – especially because VARs and MSPs are likely one of those third-party connections.

Risk 104
article thumbnail

ISG Presents 2021 ISG Star of Excellence Awards to Hexaware, Infosys and Rackspace Technology

CyberSecurity Insiders

Connors announced Hexaware, Infosys and Rackspace as the winners of the fourth annual ISG Star of Excellence Awards for earning the highest cumulative customer experience scores across all regions, industries and technology areas. STAMFORD, Conn.–(

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The people problem: Large businesses shift resources to address risks tied to new and disgruntled employees

SC Magazine

Organizations move on plans to strengthen security policies, increase training, and invest in technology. These efforts focused squarely on the people problem: addressing increased risk tied to employees working from home and workforce tensions amid societal pressures from the pandemic. Phishing remained the most frequent threat.

Risk 65
article thumbnail

Internet Backbone Giant Lumen Shuns.RU

Krebs on Security

Lumen Technologies , an American company that operates one of the largest Internet backbones and carries a significant percentage of the world’s Internet traffic, said today it will stop routing traffic for organizations based in Russia. However, we are taking steps to immediately stop business in the region.”

Internet 292
article thumbnail

NetSPI’s Analysis of HTTP/2 Rapid Reset 

NetSpi Executives

A novel 0-day vulnerability referred to as, “HTTP/2 Rapid Reset,” (CVE-2023-44487) sent the cybersecurity industry into quick action to minimize potential risks. This vulnerability abuses certain features of HTTP/2 protocol and allows for Distributed Denial of Service (DDoS) attacks at an unprecedented scale. of all websites.

DDOS 52
article thumbnail

Episode 243: The CSTO is a thing- a conversation with Chris Hoff of LastPass

The Security Ledger

Paul talks with Chris Hoff the Chief Secure Technology Officer at LastPass about the CSTO role and the security implications of “software eating the world.”. In our latest podcast, Paul caught up with Chris Hoff ( @Beaker ) on the sidelines of the Black Hat Briefings to talk about his new role as Chief Secure Technology Officer (CSTO?)

CISO 52
article thumbnail

With thousands of vendors, companies typically have limited grasp over supply chain security

SC Magazine

While 80% of the 1,500 technology and procurement chiefs surveyed by BlueVoyant had experienced at least one breach caused by a third-party vendor 12 months prior, most (anywhere from 71% to 81%, depending on the industry) don’t monitor all third-party suppliers for cyber risk. It’s something that can no longer be overlooked.”.

Risk 70